Exam Sim Questions Flashcards
Review Observed Exam Questions
You want to ensure that the sender of the message or network transmission is authenticated, and not an imposter or a phishing attempt. What method provides the highest level of origin authentication?
AES-CCMP (Advanced Encryption Standard)(Counter Mode with Cypher Block Chaining Media Access Control Protocol)
You use a computer on a TCP/IP network to transfer data through well-known TCP port 80. Which protocol is most likely being used to transfer data?
HTTP (Hypertext Transfer Protocol)
Computer A needs the IP address of Computer B, but Computer A only knows Computer B’s FQDN. Where is this information found?
Forward Zone [FQDN = Fully Qualified Domain Name]
Which attack directs user traffic to a malicious web site without any outside communication from an attacker?
DNS poisoning
You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered?
dual-homed firewall
You are the network administrator for a healthcare organisation. Recently several federal and state government laws hav been enacted which will affect network operations. Which change management documentation should record this information?
Regulations
Your company needs to be able to provide employees access to a suite of application. However, you do not want the employees to install a local copy of the applications. What method should you use to deploy the suite of applications?
SaaS (Software as a Service)
You are concerned about malware and workstation security, and you do not want users to use USB flash drives to export or import files. You also have no need for Telnet or FTP services. What should you do to increase security on your systems?
- Disable device ports
- Disable unnecessary services
What should a business with a main office downtown use to communicate with various offices in nearby suburban locations?
MAN (Metropolitan Area Network)
You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via email. What is the issue?
VLAN mismatch
You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next?
Connect to the network and try to transfer a file
You have been hired as a consultant for the medium-sized business. As part of your duties, you need to make recommendations on changes to the network. You decide that you want to install agents on the network devices to monitor network traffic and record the behaviour of network components. You will then use the statistical data that is gathered to make your recommendations. Which standard should you deploy?
SNMP (Simple Network Management Protocol)
For a new office space, you have been asked to choose a best cost solution for providing wireless network access for up to 60 employees. Your boss has informed you that there will be a mix of 802.11n and 802.11ac devices in use. The maximum distance from WAP to any user is 150ft (46M). Which kind of wireless access point should you buy?
802.1n the maximum indoor range is 230ft (70m) where as 802.11ac is only 115ft (35M)
Prior to deploying a new wireless access point at a retail store that is located in a strip mall, you decide to perform a site survey. What is the purpose of doing this?
- to calculate the number of access points required for the coverage area
- to find the frequency and power settings to be used on access points
You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy?
EAP-TLS (Extensible Authentication Protocol with Transport Layer Security)
You install a second NIC in your Linux computer. Then you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0 . What command should you issue at a command prompt to configure the NIC?
ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up
Which statement is true of a network based intrusion detection system? (NIDS).
a) an NIDS generate a finite number of alarms
b) An NIDS does not analyse realtime information
c) a NIDS cannot detect an intruder who is logged on to a host computer
d) an NIDS is active while gathering data over the network
c) a NIDS cannot detect an intruder who is logged on to a host computer
You have been hired as a network administrator for a large corporation. This network includes a large number of switches that must be identically configured. In the past this information has been configured manually. You want to automatically propagate the VLAN information to all switches on the LAN. What should you use?
802.1q VTP
To automatically propagate VLAN information to all switches on the LAN you should use VLAN Trunking Protocol (VTP) which is also referred to as 802.1q.
You have decided to implement ISAKMP. What is provided by this technology?
A protocol that works with IPSec to establish a secure session.
Internet Security Association and Key Management Protocol (ISAKMP)
What attack involves the use of multiple computers with the purpose of denying legitimate access to a critical server?
distributed denial-of-service (DDOS) attack
Your company is building a new facility, and you are tasked with designing the new network at that site. You will need multiple servers, switches, patch panels, UPS equipment and other equipment. You need to plan and document the placement of the equipment in the site’s network data centre. Which tool should you use?
Rack Diagrams - rack diagrams depict the placement of network equipment such as: routers, switches, hubs, patch panels, servers and more in a standard 19” wide cabinet called a rack
You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network?
Collisions - an excessively high number of collisions occurring for a sustained length of time can cause delays and slow throughput. CSMA/CD will negotiate standoff timers to allow multiple devices to communicate on congested network segments
Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network?
VoIP-PSTN gateway -These devices establish the routing of calls to the existing PSTN network
You administer your company’s network, which is connected to the internet. A firewall is configured between the company network and the internet. You want to prevent users on the internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent internet users from entering the company’s network on that port?
80 TCP
Workstation A4 and A5 were recently added to the network. Since the clients have been added, the network has been running very slowly. Which two conditions could be causing the problem?
- A connector is loose
- The bus network might be missing a terminator
You are explaining the function of a multi-layer switch to several junior administrators. On which data can multi-layer switches make routing decisions?
- Port number
- IP address
- MAC address
- Protocol
A multi-layer switch operates at Layers 2, 3, 4 of OSI model
You have reconfigured your network to change the cable type used on one of your subnets from Cat5 to Cat6. Which change configuration management documentation should you revise?
-Network Baseline
- Physical Network Diagram
You have been handed a document that details the steps to take to update the network drivers. What type of change management document do you have?
Procedures
Which DSL technology provides the highest data rate?
a) SDSL
b) HDSL
c) ADSL
d) VDSL
Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate at 51 to 55 megabits per second over cable lengths of up to 1000ft or 300 metres
An employee shows you a web site that publishes the SSIDs and passwords for private wireless networks in your area. The information on your company’s wireless network is included. Of which type of attack is this an example?
War Chalking. Originally occurred when hackers wrote SSID and security information on the side of buildings. This attack has steadily evolved to the point where hackers are now publishing this information on websites
You have been hired as the network administrator. The company’s network consists of several subnetworks located in various locations across the southeast United States. You want to deploy switches across the different locations so that you can implement virtual local area networks (VLANs). What is the primary benefit of this implementation?
Users can be grouped by their work functions, by shared applications or protocols, or by department, regardless of their geographical location
A user is complaining about wireless connectivity. Their cubicle is on a concrete wall, and the wireless access point in mounted on the other side of the wall. What describes what is happening to the wireless signal that only has to travel a few inches?
Absorption - occurs when an object does not reflect or refract a wireless signal, but rather absorbs a portion of it. Different materials have different absorption rates, concrete high, drywall low
Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue?
Unresponsive Service
Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy?
Mesh - A mesh topology in wireless networks only requires one access point to be physically connected to the wired network where as in a traditional wireless network each access point must be physically connected to the wired network
You are setting up a 10-Mbps SOHO network at a residence. What is the lowest category or level of UTP cable that you should use as transmission medium for small LAN communication in the 10-Mbps range?
Category 3 - Although you could use Category 3 or Category 5 cable for the LAN, Category 3 is the lowest category cable that you could use for the LAN.
Your company has recently leased the office next door to the one currently being used. Both offices will be used. The current office has a Cat 6 network installed. The new office has a fibre network installed. You need to connect the networks of the two offices. Which device should you use?
Media Converter - Media converters work on the Physical layer of the OSI model
You are deploying a virtual private network (VPN) for remote users. You want to meet the following goals:
- The VPN gateway should require the use of Internet Protocol Security (IPSec)
- All remote users must use IPSec to connect to the VPN gateway
- No internal hosts should use IPSec
Which IPSec mode should you use?
host-to-gateway - in this configuration, the VPN gateway requires the use of IPSec for all remote clients
You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the result of your actions?
Network device will now operate in full-duplex mode
You are the network administrator for an organisation whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation?
Cost - OSPF is a link-state routing protocol which uses cost as a metric for optimal path calculation. It is an open standard protocol based on Dijkstra’s Shortest Path First (SPF) algorithm.
You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port. Which switch feature should you use?
Port Mirroring - Copies traffic from a single port to a different mirror port, but prevents bidirectional traffic on the port. It allows you to view all of the traffic for a single VLAN, no matter the switch where the traffic originates. Local port mirroring only uses ports from the same switch. Remote port mirroring uses ports from multiple switches.
Which mitigation technique reduces the attack profile of a device or network?
Role Separation - involves dividing server duties amongst two or more servers to reduce an attack profile.
An employee has just relocated to the New York office, after working in Paris for the past five years. Both offices use DHCP to issue IP addresses. She brought her company laptop with her. The laptop was issued in Paris. As she is settling into the new office, she is not able to connect to the network. What is the most likely cause of her problem?
Duplicate MAC addresses - can be caused by MAC address spoofing or by manufacturers reusing MAC addresses in their devices. Manufacturers will often ship NICs with duplicate MAC addresses to different geographic areas
The network administrator has changed the IP address of several servers on the network. Now a user named Jim is unable to connect to file shares on those servers using the computer name. You need to run the appropriate command(s) on Jim’s computer to resolve the problem
ipconfig /flushdns - All you need to do is flush the contents of the clients computers DNS cache
Which action would you perform to look for candidates for exploitation across an information system?
Vulnerability Scanning - looks for areas that are candidates for exploitation (weak spots) in networks, operating systems, applications and equipment. Vulnerability scans can also identify the effectiveness of in-place systems designed to prevent those exploits
A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy?
PAT - Port Address Translation provides port address translation. When using PAT you are able to share a single public IP address among multiple computers on the same network
Which component of a computer use policy should state that the data stored on a company computer is not guaranteed to remain confidential?
No exception of privacy policy
A company procedure calls for using IPv4 and IPv6 loopback addresses as part of the troubleshooting process. What is the purpose of this tool?
To provide an IP address for testing the local IP stack without a physical network connection
A user reports that she cannot print from her computer. You also notice that they are unable to reach a supplier’s website. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis?
ping - allows you to test the connection between a local computer and a node on the network.
A suburban office location for your company is located next door to a regional airport, where a US government regional weather radar system is also housed. You are tasked with setting up a wireless 802.11ac network in that location. You must select a range of 80MHz channels, some devices on that network have 802.11n wireless interfaces. Which channels should you choose?
Channels 36-48, Channels 149-161 - all 802.11n and 802.11ac client devices support use on these two bands. Channels 52-64 reserved for weather radar systems. Channels 100-144 also government weather radar systems and do not work with older 802.11n client devices. Channel 165 is only 20MHz wide.
You need to deploy a fibre distribution panel for datacenter, remote office, or local area network use. Which of the following are NOT important for such uses?
a) Support for SFP+
b) Bulkhead adapters and receptacles
c) Cable Storage
d) Cable Splices
e) Support for GBIC connectors
f) Cable termination
a) Support for SFP+ and e) Support for GBIC connectors
Technicians have recently reported to you that the type of lighting in your company’s building can affect the network communication. What type of lighting is in the building?
Fluorescent lighting fixtures - emit high levels of EMI
Which connection type allows for connections of up to 44.736Mbps?
T3 - The T-carrier system and E-carrier system offer several different levels of connections:
T1 = 1.544Mbps, 650ft, UTP/STP/Coaxial
T3 = 44.736Mbps, 450 ft, Coaxial
E1 = 2.048Mbps, 650ft, UTP/STP/Coaxial
E3 = 34.368Mbps, 450 ft, Coaxial
What is typically used to conceal the nature of a social engineering attack?
Believable language
While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500m fibre cable with a small service loop and suspects it might be the cause of the outage. What is most likely the issue?
Maximum cable length exceeded - On a 10GBase-SW network the maximum cable length is 300m
As a network administrator you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function?
Physical - Active hubs or multiport repeaters amplify or regenerate signals to all other ports on the hub
Which suppression methods are recommended for a fire in a facility that involves paper, laminates, and wooden furniture?
Soda Acid, Water - Soda acid removed the fuel while water reduced the temperature this combination are used to extinguish class A fires
Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks?
signature-based IDS - watches for intrusions that match a known identity or signature, must be updated to remain effective
You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network, you decide to implement two subnets on the network. What are the reasons for implementing subnets on an IP network?
- to reduce congestion by decreasing network traffic
- to increase network security
- to expand the network
- to reduce CPU use
- to isolate network problems
You are designing a network for a new facility. The client wishes to provide main connection to several floors from where the ISP service enters the building. On each floor switches will handle the distribution to end devices. What would be the most helpful for maintaining and documenting those main connections?
IDF/MDF documentation - Intermediate Distribution Frame/Main Distribution Frame documentation first describes and details the primary ISP feed into the building, which is handled by the MDF. IDF/MDF Documentation also shows how the MDF splits out and feeds the various IDFs throughout the facility.
You are investigation possible unauthorised access to a Windows Server 2008 computer. The first step in your company’s investigation policy states that the current network connections must be documented. Which command should you use?
netstat - displays incoming and outgoing connections, routing tables and network interface statistics.
Which of the following can use RFID to identify the location of the object?
a) Key Fobs
b) Biometrics
c) Locks
d) Asset tags
d) Asset tags - also referred to as asset tracking tags can be labels with barcodes or QR codes, or can include radio frequency identification (RFID) chips that provide electronic tracking.
Which media-access method does the 802.11 standard specify for wireless networks?
CSMA/CA - Carrier Sense Multiple Access/Collision Avoidance
You have installed a new MAU on your Token Ring network because the old one is no longer supported by the product vendor. At what layer of the OSI model does this device operate?
The Physical Layer - A Multistation Access Unit (MAU) is a network connection concentrator used on Token Ring networks. Similar to a hub
You need to obtain the current protocol statistics and port connections for Windows and UNIX/Linux computers. Which tool should you use?
netstat - Netstat is a TCP/IP utility that you can use to determine the computer’s inbound and outbound TCP/IP connections. It displays current connections and their listening ports
You have decided to implement a firewall between your company’s network and the internet. What does a firewall software solution typically provide?
- IP proxy services
- Packet Filtering
- HTTP proxy services
You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the internet. Upon troubleshooting the problem you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the internet. What is causing this?
The computers are configured to operate in ad hoc mode.
You are analysing communication over your network. You have captured all the packets sent to and from a server on your network. You need to filter the packet capture to only IMAP4 protocol communications. Which port does this protocol use?
TCP port 143 - Internet Message Access Protocol is an internet protocol for e-mail retrieval. IMAP4 works at the application layer of the OSI model
your company needs to deploy a wireless network to allow users to connect to the network using mobile devices. You are concerned that the radio signal will not cover the amount of area you need. Another technician instructs you to research the angle of radiation of the wireless access point’s antenna. Which term is used to refer to this?
Beamwidth
You use a computer named Wkst1 on a TCP/IP network which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur and several data packets are lost during transmission. What will most likely occur as a result of losing packets during transmission?
The protocol will drop the packets, The application will automatically retransmit the packets when it detects UDP has dropped packets
What technology implements packet tagging in a LAN?
CoS - Class of Service implements packet tagging in a local area network. It tags the different types of traffic, such as video streaming or VoIP. the tag is a value between 0 and 8, with 0 being the highest priority
What is the purpose of a pointer (PTR) DNS record?
It maps an hostname to an IP address
Which option is a critical metric in preventive maintenance that would allow you to schedule the replacement of a component at a convenient time, as opposed to waiting for the component to fail at an inopportune time?
MTBF - Mean Time Between Failures is the average, or mean time between failures on a device or system. It is an expression of reliability
You need to implement Spanning Tree Protocol to prevent network loops when more than one path can be used. Which two devices could you deploy?
Switches, Bridges - use STP to prevent loops in the network. STP uses Spanning Tree Algorithm (STA) to help a switch or a bridge by allowing only one active path at a time.
Which RADIUS implementation was created to deal with Voice over IP(VoIP) and wireless services?
Diameter was created to deal with VoIP and wireless services. It was created to address new technologies that RADIUS was not deigned to handle.
While designing your network architecture, you decide to configure multiple VLANs to a router within your network. You are aware that having multiple VLANs on a single router will not be feasible to manage. What should you do to help mitigate this problem?
Implement sub-interfaces on your routers. Sub-interfaces are used to help manage multiple VLANs within a router and facilitate intercommunication with each other. A sub-interface can be configured virtually on a router or switch so that each device connected to a VLAN appears under the same IP address, causing the IP address to act as a default gateway
To improve security you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change users report that they cannot access any web sites hosted by Web1 by using their fully qualified domain names (FQDNs). however they can access other web sites that are hosted on other web servers by using their FQDNs. What is causing this problem?
The new web address starts with https instead of http, users are most likely attempting to access via http:// instead of https://
You want to enable port authentication on your network switches. On which setting is port authentication based?
MAC address - Port authentication on your network switches is based on the switch’s MAC address. If the switch is not specifically configured with a MAC address, the MAC address communication is not allowed through the switch port
The network administrator has changed the IP address of several servers on the network. Now a user named Jim is unable to connect to file shares on those servers using the computer name. You need to run the appropriate command(s) on Jim’s computer to resolve the problem
ipconfig /flushdns - all you need to do is flush the contents of the client computer’s DNS cache
Your Windows 7 computer is located on a TCP/IP network that uses DHCP. You want your computer to release its lease on the TCP/IP configuration that it received from the DHCP server. Which command should you issue to release the configurations?
The ipconfig command with /release to release your computer’s lease on the TCP/IP configuration that it received from the DHCP server. If other computers cannot locate your computer on the network then you might need to renew the DHCP lease for your TCP/IP configuration which would use /renew
Which protocol is NOT capable of preventing a man-in-the-middle attack? HTTPS, SSH, rsh, IPSec?
rsh - Remote Shell protocol is used to log onto remote computers and can be easily exploited by a man-in-the-middle attack (MITM) because it neither provides encryption nor authentication of data
Your company has decided to implement an acceptable use policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit for management approval. What is defined in this policy?
How users are allowed to employ company hardware
Which protocol is categorised as an Exterior Gateway Protocol (EGP)?
BGP - Border Gateway Protocol is used between autonomous networks. BGP is an algorithm to determine the quickest route between networks
What provides both authentication and authorisation using UDP?
RADIUS - Remote Authentication Dial-in Service was originally designed for dial-up networking and validates the credentials of a remote user against a stored database
You have reconfigured your network to change the cable type used on one of your subnets from cat5 to cat6. Which change configuration management documentation should you revise?
Physical Network Diagram, Network Baseline
Which type of network would be set up in an office for computers and mobile devices that do NOT comply with the company’s NAC policies?
Quarantine network - A NAC server would hold the policies that would control access to the network. If computers or mobile devices did not have the appropriate security controls configured, they would be placed on the quarantine network to isolate them
Which is NOT associated with data conversion between the ISP and the customer premises equipment? ATM, Demarcation point, CSU/DSU, Smart Jack?
Asynchronous Transfer Mode (ATM) is NOT associated with data conversion between the ISP and the customer premises equipment. It is a network transmission model used in voice, video and data communications. ATM uses equally sized cells that are all 53 bytes long. The equal length of the data packets supports very high data rates. ATM is deployed in Optical Carrier (OC) backbone network segments
You are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the WAN. They were able to access the entire WAN earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the WAN. You have been able to gather information about the problem, duplicate the problem, question the users and adequately establish the symptoms of the problem. What should you do next?
Establish what has changed -
Which of the following options are relevant to network segmentation when using switches? Tagging and untagging ports, Mac address tables, VLANs, ARP tables?
Tagging and untagging ports, VLANs - VLANs allow you to segment a network and isolate traffic to different segments. VLANs are created by tagging and untagging ports on a switch
Currently your company uses IPv4 across its enterprise. Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4?
The IP header options allows more efficient forwarding and less rigid length limits, Some header fields have been dropped or made optional
You are setting up your company’s VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which possibilities do you want to eliminate first?
The call terminates on an analog endpoint - If one call terminates on an analog endpoint, occasional audio problems are inevitable
You have been hired as a contractor to implement a small office home office (SOHO) network for a small business. While gathering the requirements and constraints regarding the network you decide to implement two subnets on the network. What are valid reasons for implementing subnets on an IP network?
To increase network security, To reduce congestion by decreasing network traffic
A company procedure calls for using the IPv4 and IPv6 loopback addresses as part of the troubleshooting process. Which explanation best represents the purpose of this tool?
To provide an IP address for testing the local IP stack without a physical network connection
You a re a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PPTP server has been configured on each LAN. Which protocol should you use to establish a connection between the PPTP servers?
PPP - Point-to-Point Protocol should be used to establish a connection between the Point-to-Point Tunneling Protocol (PPTP) server in Las Angeles and the PPTP server in Paris
You have recently been hired by a company as its network administrator. Currently, all service packs and security updates are deployed directly to the computers and applications that need them. Last month this resulted in a server outage of four hours because of a bug in a security update. Management wants to prevent issues with any future updates. You need to recommend a solution to this problem. What recommendation should you make?
Deploy a test lab - all service packs and other updates will be deployed in the test lab first. If they do not cause any issues you can then deploy the service packs or updates in the live environment
Which device or feature provides a bridge between the physical environment and the virtual environment?
Virtual NIC - In common practice it is bridged to the physical NIC on the host system so the virtual machine can communicate with another network segment or the internet
Which suppression methods are recommended for a fire in a facility that involves paper, laminates and wooden furniture?
Soda acid, Water -Soda acid removes the fuel while water reduces the temperature.